CVE-2025-49219
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-17

Last updated on: 2025-09-08

Assigner: Trend Micro, Inc.

Description
An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-17
Last Modified
2025-09-08
Generated
2026-05-06
AI Q&A
2025-06-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 14 associated CPEs
Vendor Product Version / Range
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
trendmicro apex_central 2019
microsoft windows *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-477 The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained.
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-49219 is a critical remote code execution vulnerability in Trend Micro Apex Central versions below 8.0.7007. It arises from insecure deserialization in the GetReportDetailView method, where improper validation of user-supplied data allows an attacker to deserialize untrusted data. This flaw enables a remote attacker to execute arbitrary code without authentication, running with NETWORK SERVICE privileges. [1]


How can this vulnerability impact me? :

This vulnerability can allow an unauthenticated remote attacker to execute arbitrary code on affected systems with NETWORK SERVICE privileges. This can lead to full compromise of the affected installation, including potential data theft, system manipulation, or disruption of services. Because it requires no authentication and has a high CVSS score of 9.8, it poses a severe security risk. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for exploitation attempts targeting the GetReportDetailView method in Trend Micro Apex Central. Trend Micro has provided proactive secondary protections via Network IPS rules/filters such as TippingPoint and Trend Micro Cloud One Network Security Filter 35498, and Cloud One Workload Security and Deep Security Rule 1012375, which can help detect or block exploitation attempts. Specific commands are not provided in the resources. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the critical patch (CP B7007) released by Trend Micro for Apex Central on-premises versions 8.0.7007 and later. For SaaS versions, the issue has been addressed in the backend during the April 2025 maintenance cycle. Additionally, reviewing and tightening remote access policies and perimeter security is recommended. Utilizing the provided Network IPS rules/filters (TippingPoint, Trend Micro Cloud One Network Security Filter 35498, Cloud One Workload Security and Deep Security Rule 1012375) can provide proactive secondary protection. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart